BUSINESS > Services > Financial


« Back to News

2015-12-09

Insurance Tech Faces the Internet of Things Arms Race

As business intelligence and analytics technologies improve, insurers are developing strategies around easily accessible external data sources.

2015-12-02

Bitwalking: Digital Currency Pays People to Walk

Bitwalking dollars will be earned by walking, unlike other digital currencies such as Bitcoins that are "mined" by computers.

2015-12-02

Coinbase Shift Payments To Bitcoin Debit Card

A debit card integrating all your currencies, both real and virtual, together in one payment source.

2015-12-04

Russian Financial Cybercrime

Russian cyber criminals have evolved and gained a reputation for sophisticated financial crime; it's top flight are believed to have stolen over $790m.

2015-11-25

Cyber Warfare Specialists NSO Group Explore $1Billion Sale

Secretive maker of spyware is about to cash out with a major trade sale.

2015-11-25

UK & US Banks Prepare For Cyber Attack Stress Test

Stress Test: Finance centres in London and New York are being hit with simulated cyber attacks this month.

2015-11-30

Entrepreneur’s Guide To Surviving A Tech Bubble

Venture Capital money is chasing the next tech Unicorn. As cyber security is the hot startup sector it's time to ask a few questions.

2015-11-18

FBI Takes Down Alert on Chip & PIN Credit Cards

The American Bankers Association are not happy about the FBI's warning to consumers on the risks on new Chip & PIN credit cards.

2015-11-18

Cybercrime: How to Recognize an Online Fraudster

The switch to Chip & PIN cards in the US is driving attempts to profile online fraudsters. The results may surprise you.

2015-11-18

Mystery Fingers on Keyboard in JPMorgan Hack

The identity of a master hacker behind the biggest attack ever on the US financial system is being withheld by prosecutors. Why is that?

2015-11-21

Cyber War Games: ‘Too Little Too Late’

Financial centres in London and New York are to be hit with a simulated cyber-attack later this month.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Lima Networks

Lima Networks

LIMA design and deliver IT Infrastructure solutions and services including managed Security Monitoring services.

Intelligence-sec

Intelligence-sec

Intelligence-Sec is a fully integrated Conferences and Exhibitions Company managing and producing topical events for the security industry.

Lastline

Lastline

Lastline is the leader in advanced malware protection.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Secure Recruitment

Secure Recruitment

Secure Recruitment is a specialist Executive Search business that focuses its efforts on attracting specific exceptional talent in Cyber Security.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

Cybertronium

Cybertronium

Cybertronium is a leader in managing cyber risk. We bring you the latest from the complex, ever-evolving online threat environment with the insights to inspire and the expertise to act.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.